Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing
|
|
- Estella Cecilia Barnett
- 5 years ago
- Views:
Transcription
1 Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing M.Desiha Department of Computer Science and Engineering, Jansons Institute of Technology Coimbatore, Tamilnadu, India Vishnu Kumar Kaliappan Department of Computer Science and Engineering, Jansons Institute of Technology Coimbatore, Tamilnadu, India Abstract Visual cryptography is a fixed technique which allows visual information to be encrypted using an encoding system and decrypted by an automatic operation that doesn t need a terminal. A visual cryptography strategy (VCS) is a method of secret splitting strategy which converts a secret image into n portions of dual form.vcs is not highly-effective and highlyworth, because of the security issues. Due to various disadvantages of VCS, a popular method called extended visual cryptography strategy (EVCS) was developed, where the portion images are constructed to contain expressive cover images, thereby used for biometric security techniques. In this paper, we have proposed the effective dithering halftone technique for time reduction process on generating the halftone image and also for enlightening the visual quality of the secret image. The resulting strategy has good security and effective processing over the existing extended visual cryptography approach. Keywords- visual cryptography strategy (VCS), extended visual cryptography strategy (EVCS), dithering halftoning technique and secret splitting I. INTRODUCTION Visual cryptography is first presented by Naor and Shamir in 1994, is a secret splitting strategy, based on dual form [1]. The prime secret image is divided into n portions, which doesn t reveal any evidence of the prime secret. The n portions will be dispersed to n participants so that only by contraction all the portions will regenerate the secret image. kn, strategy generates n portions, but it More generally, a ( ) only compels k portions to contract to regenerate the secret image. Particularly, in a ( kn, ) threshold visual cryptography strategy (VCS), any suitable subset of participants should contain at least k participants, where k n. Visual cryptography has protection purpose based on biometrics [2]. The advantage over VCS is that it is simple and not complex and the disadvantages are size expansion of portions and low visual quality of the revealed image. This strategy does not have high quality and effect. The extended visual cryptography strategy (EVCS) which can construct expressive portion images to regenerate the prime secret was intended by Ateniese, Blundo and Stinson [3], where it gives a simple example of (2, 2) EVCS. The fixed VCS that have the same approach structure with the EVCS. In EVCS the portion images that are to be embedded contains expressive cover images. EVCS is similar to the technique of steganography. The purpose of EVCS is to avoid the custom reviews, because the portions of EVCS are communicative images, hence this makes very few chances of suspecting and detecting the portions. In [4] the embedded extended visual cryptography strategy (EEVCS) gives the overall good properties. By comparing the intended strategy with the existing strategies of well-known EVCS, the intended strategy has competitive visual quality. Besides, the EEVCS strategy has more specific advantages over these well-known EVCSs. In order to improve the modest visual quality of the image in [3, 4] an innovative technique named halftone visual cryptography was intended. The halftone process was intended to achieve the visual cryptography via halftoning. The halftone techniques used in [3, 4] gives a progress quality from the existing techniques. In [4] the dithering halftoning technique is used which gives good quality but the drawback is that when the dimension of the dithering matrix is less the halftone processing is slow. The intension of the research outlined in this paper is by enlarging the dimension of the halftone dithering matrix. By doing so the halftoning process timing is reduced. The rest of the paper is organized as follows. Some related works are reviewed in section II. II. RELATED WORK In this section, we give some explanation about VCS and EVCS and their use in our paper /15/$ IEEE
2 A. VCS kn VCS is to portion a dual secret image into n portions in [1]. The secret image can be revealed by combining any k portions. A ( kn, ) VCS consist of two collections of a b matrices C and C 1. To portion a white secret pixel chooses the portion matrix C and to portion a black secret pixel chooses the portion C. Then distribute each row of the chosen matrix to The concept of (, ) matrix 1 the corresponding portion as the block of sub-pixels. Example 1: Two basis matrices of (2, 2) VCS are constructed by Naor and Shamir s strategy as follows: advantage of EEVCS is that, it is very secure in hiding the secret portions into the cover images that cannot be easily retrieved by an unauthorized member. In [3] the (2, 2) EVCS there is pixel expansion in the recovered image, this drawback is avoided in [5], Figure. 2 shows the input images for (2, 2) EVCS (a) Cover image 1(b) Cover image 2 (c) Secret image. (a) (b) B 1 = 1 B 1 1= 1 The two portion matrices C and C 1 are constructed from the basis matrices B and B 1 by permuting the columns of B and B 1, respectively. Figure. 1 (a) Secret image; (b) Portion 1; (c) Portion 2; (d) Revealed secret image. (c) Figure 2: An example of (2, 2) EVCS input images (a) Cover image 1 (b) Cover image 2 (c) Secret image (cited in [5]) (d) (a) (e) (b) (c) (d) Figure 1: An example of (2,2) VCS (a) Secret image (b) Portion 1 (c) Portion 2 (d) Recovered secret image (cited in [1]) B. EVCS An Extended Visual Cryptography Strategy (EVCS) is a kind of VCS which consist of expressive images, when compared to the random portions of fixed VCS. EVCS is also treated as a technique of steganography. A construction of EVCS is realized by embedding the secret portions into expressive cover images and we call it as embedded EVCS. When comparing the result of EEVCS result in [4] to some of the well-known EVCSs intended in recent years has a competitive visual quality in the literature. The specific (f) Figure. 3: Shows the Embedded cover images and Recovered secret image of (2, 2) EVCS (d) Embedded Portion 1 image (e) Embedded Portion 2 image (f) Recovered secret image (cited in [5]) The Figure. 3 shows the embedded cover images and recovered secret image (d) Embedded Portion 1 image (e) Embedded Portion 2 image (f) Recovered secret image. The recovered secret image is got by combining (d) and (e) image will regenerate the prime secret image (f). III. SYSTEM ARCHITECTURE The overall system flow chart is shown in Figure. 4 that shows the detailed flow of the whole working of the system intended in step by step. Each processing is explained in detail in the subdivision of A, B and C, respectively. Step 1: Input images like Cover image 1, Cover image 2 and Secret image. Step 2: Convert the secret image to gray secret image. Step 3: Use the converted image for halftone process to get the halftone secret image.
3 Step 4: The output halftone secret image is used as an input for portion generation. Here, secret portion 1 and portion 2 images are generated. Step 5: The generated portion 1 and portion 2 are embedded into the cover images. The portion 1 is embedded into the cover image 1 and portion 2 into the cover image 2. Step 6: The embedded portion images are fed into the extraction process, where the extraction of portion images from cover images are done. And the extracted portions are combined together to recover the prime secret image. {,..., cd} as the gray-level of a pixel in the prime, the g image. Normally, for an input image I of size p halftoned process will move over each pixel in I. The intended halftoning process moves on each pixel in I as explained in Algorithm Figure. 5: Shows the patterns of dithering matrix D of ten gray-level,..., 9 (cited in [4]) q Figure. 4: Shows the system flow chart A. Pre-processing In this first phase, we have loaded the input images for halftoning process. The secret image is converted into gray image and the converted image is used for halftone process. In the intended work the pattering dithering halftone technique is used for generating the halftone image. This dithering halftone technique is used to produce halftoned pattern at the position of the pixel x. The dithering matrix c d is denoted as D.The entries, denoted as Dij for i c 1 and i d 1, of the dithering matrix between and cd 1.Note that Algorithm 1: The halftoning process for each pixel x in image I : Input: c d dithering matrix D and a pixel x with g as gray-level in input image I Output: The halftoned pattern at each location of the pixel x For i = to c 1 do For j = to d 1do If g D then print a black pixel at the location (i, j); ij Else print a white pixel at location (i, j); Example 2: Dithering matrix D is shown below. k n Dithering matrix D with ten gray-levels D = The above dithering matrix D is taken as example, the patterns of gray-levels,...,9 are shown in Figure. 5.If the gray-levels of all the pixels in the image I are smaller than 4, then the locations corresponding to D, D1, D2, D 11 and D12 are always black even after halftoning, where Dij indicates the ith row and jth column of D. The drawback in [4] is that, as the gray-level decreases the halftoned image produced will become darker. The outcome of the image won t be in good quality. In order to avoid this drawback the patterning halftone is removed and a new enhancement is done here for progress quality as well as for time reduction in halftone process. The enhanced algorithm for dithering halftoning technique is shown in the Algorithm 2.
4 B. Embedding the generated portions Embedding is the second phase; the secret image generates two or more portions, where EVCS is used for embedding each portion into the expressive cover images. The n portions are given as input, with the corresponding VCS ( C, C ) with pixel expansion m and secret image I. The 1 output produced will be having n embedded portions e, e1,..., en 1. For doing this, divide the portions t m subpixels each. Choose into blocks that contain ( ) m embedding positions in each block in the n covering portions. For each black pixel in I, randomly choose a portion matrix M C1 and for each white pixel in I, randomly choose a portion matrix M C. Embed the m sub pixels of each row of the portion matrix M into the m embedding positions. Hence the pixels in the embedding positions are replaced by the sub pixels of the portion matrix. Figure.6 showed below shows how the portions are embedded into the cover images... Portion 1 Portion 2 n Portions IV. ENHANCED EFFECTIVE DITHERING HALFTONING PROCESS The intended pattering dithering halftone algorithm in [4] is enhanced for its effective processing of time reduction and progress quality of image, as the intended algorithm in [4] is a time consuming process having no progress quality of the image. Algorithm 2: Enhanced Effective Dithering Halftoning Process Input: The dimension of the dithering matrix num is inputted. Output: The elapsed time for various dimensions is measured and a good visual quality halftoned image is generated Step 1: Enter the dimension value num for the dithering matrix as 2, 4, 8 or 16. Step 2: if num ==2 then B = B ; num (, i j ) Else if num ==4 then B = num Else if num ==8 then B = num Else if num ==16 then B = B ; B ; B num ; Else entered a wrong dimension value for the dithering matrix; 1 3 Step 3: Base matrix B = num (, i j ) 2 4 is calculated with the e e 1 en = Cover1 Cover 2 n covers Stacking 4 B + B 4 B + B B num = 2 4 B + B 4 B + B different dimension value num. ( num 2)/4 num (,) ( num 2)/4 num (,1) ( num 2)/4 num(1,) ( num 2)/4 num (1,1) Step 4: For i = to c 1 do for Portion 1 Portion 2... Figure.6: Shows the embedding of the generated portions C. Extracting the portions Extraction is the third phase, in order to extract the secret image the only process can be done by stacking the portions that were embedded. At this point, by stacking the embedded portions of the secret image is revealed, the t m subpixels that have not been embedded by the secret subpixels are black and the m subpixels that are embedded by the secret subpixels recover the secret image as the corresponding VCS does. Hence the secret image is recovered through extraction process. For j = to d 1 do If g D then print black pixel at position (i, j); ij Else print white pixel at position (i, j); V. EXPERIMENTAL RESULT The experimental results are shown in Figure. 7 shows the result of the loaded secret image and the converted gray secret image. The Figure. 8 shows the result of the halftoned image using dithering technique. The table I. gives the measurement of the time taken by the halftoning process, where the time reduction happens for various dimension of the dithering matrix. The 2 2 dimension of the dithering matrix
5 has the highest elapsing time as seconds. The 4 4dimension of the dithering matrix has the elapsing time seconds as less when compared to 2 2 dimension. The 8 8dimension of the dithering matrix has the elapsed time seconds as less when compared to 4 4 and 2 2 dimensions. The dimension of the dithering matrix has the elapsed time seconds as less when compared to8 8, 4 4 and 2 2 dimensions. And the Figure. 9 shows the example result for 2 2 dimensions elapsed timing for halftoned image using dithering matrix in the command window. Table I: Measurement of timing for various dimensions Number of Results Dimension of the dithering matrix Elapsed time 1. 2x seconds 2. 4x seconds 3. 8x seconds 4. 16x seconds VI. CONCLUSION In this paper, we have intended EVCS for embedding the random portions into the expressive covering portions. And also we have shown that using the pre-processing of halftone images, we are able to produce halftone image in good quality and also time reduction being done for halftoning process. The halftoning technique used in EVCS gives more advantages over conventional methods. Figure. 7: Experimental Result for input secret image and converted gray secret image Figure. 8: Experimental Result for Halftoned image using Dithering technique REFERENCES [1] M. Naor and A. Shamir, Visual cryptography, in EUROCRYPT 94 Proceedings, Lecture Notes in Computer Science, Springer-Verlag, vol. 95, pp. 1-12, [2] A. Ross and A. A. Othman, Visual Cryptography for Biometric Privacy, IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 7-81, 211 [3] G.Ateniese, C.Blundo, A.De Santis and D.R.Stinson, Extended Capabilities for Visual Cryptography, Theoretical Computer Science, vol. 25, pp , 21. [4] Feng Liu and Chuankun Wu, Senior Members, IEEE, Embedded Extended Visual Cryptography Schemes, IEEE transactions on information forensics and security, vol.6, no. 2, June 211. [5] N.Askari, H.M.Heys, and C.R.Moloney, An Extended Visual Cryptography Scheme without pixel expansion for halftone images, 26th annual IEEE Canadian conference on electrical and computer engineering year 213. [6] Zhi Zhou, Member, IEEE, Gonzalo R. Arce, Fellow, IEEE, and Giovanni Di Crescenzo, Halftoning visual Cryptography, IEEE transaction on image processing, vol. 15, no. 8, august Figure. 9: Example result for 2 2 dimensions elapsed timing for halftoned image using dithering matrix.
A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2
A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2 # Department of CSE, Bapatla Engineering College, Bapatla, AP, India *Department of CS&SE,
More informationAN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney
26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING YEAR 2013 AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES N. Askari, H.M. Heys, and C.R. Moloney
More informationSecret Sharing Image Between End Users by using Cryptography Technique
Secret Sharing Image Between End Users by using Cryptography Technique SRINIVASA RAJESH KUMAR D. M.Tech Scholar Department of CSE, B V C Engineering college, Odalarevu P.MARESWARAMMA Associate Professor
More informationPerformance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltonong Algorithms in Visual Cryptography
Performance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltonong Algorithms in Visual Cryptography Pratima M. Nikate Department of Electronics & Telecommunication Engineering, P.G.Student,NKOCET,
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK VISUAL CRYPTOGRAPHY FOR IMAGES MS. SHRADDHA SUBHASH GUPTA 1, DR. H. R. DESHMUKH
More informationComparison of Visual Cryptographic Algorithms for Quality Images Using XOR
Comparison of Visual Cryptographic Algorithms for Quality Images Using XOR Sathiya K 1, Senthamilarasi K 2, Janani G 3, Akila victor 4 1,2,3 B.Tech CSE, VIT University, Vellore-632014. 4 Assistant Professor,
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 2, February 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationA Novel Technique in Visual Cryptography
International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 3, Issue 10 [May. 2014] PP: 57-61 A Novel Technique in Visual Cryptography B. Ravi Kumar 1, P.Srikanth 2 1,2
More informationAn Overview of Visual Cryptography Schemes for Encryption of Images
An Overview of Visual Cryptography Schemes for Encryption of Images Moumita Pramanik 1, Kalpana Sharma 2 1 Sikkim Manipal Institute of Technology, Majitar, India, Email: moumita.pramanik@gmail.com 2 Sikkim
More informationVarious Visual Secret Sharing Schemes- A Review
Various Visual Secret Sharing Schemes- A Review Mrunali T. Gedam Department of Computer Science and Engineering Tulsiramji Gaikwad-Patil College of Engineering and Technology, Nagpur, India Vinay S. Kapse
More informationProtection of Privacy in Visual Cryptography Scheme Using Error Diffusion Technique
IJCSN International Journal of Computer Science and Network, Vol 2, Issue 2, April 2013 60 Protection of Privacy in Visual Cryptography Scheme Using Error Diffusion Technique 1 Mr.A.Duraisamy, 2 Mr.M.Sathiyamoorthy,
More informationVISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION
VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION Pankaja Patil Department of Computer Science and Engineering Gogte Institute of Technology, Belgaum, Karnataka Bharati
More informationAn Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images
An Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images Linju P.S, Sophiya Mathews Abstract: Visual cryptography is a technique of cryptography in
More informationInternational Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page
Analysis of Visual Cryptography Schemes Using Adaptive Space Filling Curve Ordered Dithering V.Chinnapudevi 1, Dr.M.Narsing Yadav 2 1.Associate Professor, Dept of ECE, Brindavan Institute of Technology
More informationImplementation of Colored Visual Cryptography for Generating Digital and Physical Shares
Implementation of Colored Visual Cryptography for Generating Digital and Physical Shares Ahmad Zaky 13512076 1 Program Studi Teknik Informatika Sekolah Teknik Elektro dan Informatika Institut Teknologi
More informationDigital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media
1 1 Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media 1 Shradha S. Rathod, 2 Dr. D. V. Jadhav, 1 PG Student, 2 Principal, 1,2 TSSM s Bhivrabai Sawant College
More informationWebpage: Volume 4, Issue VI, June 2016 ISSN
4-P Secret Sharing Scheme Deepa Bajaj 1, Navneet Verma 2 1 Master s in Technology (Dept. of CSE), 2 Assistant Professr (Dept. of CSE) 1 er.deepabajaj@gmail.com, 2 navneetcse@geeta.edu.in Geeta Engineering
More informationVisual Cryptography. Frederik Vercauteren. University of Bristol, Merchant Venturers Building, Woodland Road, Bristol BS8 1UB.
Visual Cryptography Frederik Vercauteren University of Bristol, Merchant Venturers Building, Woodland Road, Bristol BS8 1UB frederik@cs.bris.ac.uk Frederik Vercauteren 1 University of Bristol 21 November
More informationFixed Unmitigated Image Cryptography Schemes
IJCST Vo l. 3, Is s u e 3, Ju l y - Se p t 2012 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Fixed Unmitigated Image Cryptography Schemes 1 V. Redya Jadav, 2 Jonnalagadda Sravani 1,2 Dept. of CSE,
More informationEvaluation of Visual Cryptography Halftoning Algorithms
Evaluation of Visual Cryptography Halftoning Algorithms Shital B Patel 1, Dr. Vinod L Desai 2 1 Research Scholar, RK University, Kasturbadham, Rajkot, India. 2 Assistant Professor, Department of Computer
More informationVisual Secrete Sharing by Diverse Image Media
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 4 April 2015, Page No. 11615-11620 Visual Secrete Sharing by Diverse Image Media Aparna Bhosale 1, Jyoti
More informationA STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME
International Journal of Power Control Signal and Computation (IJPCSC) Vol. 2 No. 1 ISSN : 0976-268X A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME 1 P. Arunagiri, 2 B.Rajeswary, 3 S.Arunmozhi
More informationA Recursive Threshold Visual Cryptography Scheme
A Recursive Threshold Visual Cryptography cheme Abhishek Parakh and ubhash Kak Department of Computer cience Oklahoma tate University tillwater, OK 74078 Abstract: This paper presents a recursive hiding
More informationEFFICIENT VISUAL CRYPTOGRAPHY FOR GENERAL ACCESS STRUCTURES WITH STAMPING AND SYNTHESIZING
EFFICIENT VISUAL CRYPTOGRAPHY FOR GENERAL ACCESS STRUCTURES WITH STAMPING AND SYNTHESIZING 1 P.Lakshmi, 2 S.Baskari ABSTRACT -- Visual cryptography is a popular solution for image encryption. The encryption
More informationAn Image Database Security Using Multilayer Multi Share Visual Cryptography
ISSN (Online): 29-7064 Index Copernicus Value (20): 6.4 Impact Factor (20): 4.48 An Image Database Security Using Multilayer Multi Share Visual Cryptography Apurva A. Mohod, Prof. Komal B. Bijwe 2, 2 Amravati
More informationComparison of Various Error Diffusion Algorithms Used in Visual Cryptography with Raster Scan and Serpentine Scan
Comparison of Various Error Diffusion Algorithms Used in Visual Cryptography with Raster Scan and Serpentine Scan 1 Digvijay Singh, 2 Pratibha Sharma 1 Student M.Tech, CSE 4 th SEM., 2 Assistant Professor
More informationEXTENDED AND EMBEDDED VISUAL CRYPTOGRAPHY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.
More informationVisual Cryptography for Face Privacy
Visual Cryptography for Face Privacy Arun Ross and Asem A. Othman Lane Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV 26506 USA ABSTRACT We discuss
More informationA Simple Scheme for Visual Cryptography
135 Mihir Das 1, Jayanta Kumar Paul 2, Priya Ranjan Sinha Mahapatra 3, Dept. of Computer Sc. & Engg., University of Kalyani, Kalyani, India, E-mail:das.mihir20@gmail.com 1, E-mail:jayantakumar18@yahoo.co.in
More informationVisual Cryptography Scheme for Color Images Using Half Toning Via Direct Binary Search with Adaptive Search and Swap
Visual Cryptography Scheme for Color Images Using Half Toning Via Direct Binary Search with Adaptive Search and Swap N Krishna Prakash, Member, IACSIT and S Govindaraju Abstract This paper proposes a method
More informationSecured Bank Authentication using Image Processing and Visual Cryptography
Secured Bank Authentication using Image Processing and Visual Cryptography B.Srikanth 1, G.Padmaja 2, Dr. Syed Khasim 3, Dr. P.V.S.Lakshmi 4, A.Haritha 5 1 Assistant Professor, Department of CSE, PSCMRCET,
More informationA Cost-Effective Private-Key Cryptosystem for Color Image Encryption
A Cost-Effective Private-Key Cryptosystem for Color Image Encryption Rastislav Lukac and Konstantinos N. Plataniotis The Edward S. Rogers Sr. Dept. of Electrical and Computer Engineering, University of
More informationSurvey on Size Invariant Visual Cryptography
Survey on Size Invariant Visual Cryptography Biswapati Jana 1,Gargi Hait 2,Shyamal Kumar Mondal 3 1 Assistant Professor, Department of Computer Science, Vidyasagar University, PaschimMedinipur, 2 Student,
More informationAnalysis of Secret Share Design for Color Image using Visual Cryptography Scheme and Halftone
Analysis of Secret Share Design for Color Image using Visual Cryptography Scheme and Halftone Surabhi Tiwari MTech Scholar, DC (ECE), TIEIT Bhopal (RGPV), India Neetu Sharma AP, ECE, TIEIT Bhopal (RGPV),
More informationDigital Image Sharing using Encryption Processes
Digital Image Sharing using Encryption Processes Taniya Rohmetra 1, KshitijAnil Naik 2, Sayali Saste 3, Tejan Irla 4 Graduation Student, Department of Computer Engineering, AISSMS-IOIT, Pune University
More informationMulti Secret Sharing Scheme for Encrypting Two Secret Images into Two Shares
2011 International Conference on Information and Electronics Engineering IPCSIT vol.6 (2011) (2011) IACSIT Press, Singapore Multi Secret Sharing Scheme for Encrypting Two Secret Images into Two Shares
More informationAbstract. 1 Introduction. 2 The Proposed Scheme. The 29th Workshop on Combinatorial Mathematics and Computation Theory
The 29th Workshop on Combinatorial Mathematics and Computation Theory Visual Cryptography for Gray-level Image by Random Grids * Hui-Yu Hsu and Justie Su-Tzu Juan 1 Department of Computer Science and Information
More informationAn EVCS for Color Images with Real Size Image Recovery and Ideal Contrast Using Bit Plane Encoding
I.J.Computer Network and Information Security, 2014, 2, 54-60 Published Online January 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2014.02.08 An EVCS for Color Images with Real Size Image
More informationDual Visual Cryptography Using the Interference Color of Birefringent Material
Journal of Software Engineering and Applications, 2017, 10, 754-763 http://www.scirp.org/journal/jsea ISSN Online: 1945-3124 ISSN Print: 1945-3116 Dual Visual Cryptography Using the Interference Color
More informationA Visual Cryptography Based Watermark Technology for Individual and Group Images
A Visual Cryptography Based Watermark Technology for Individual and Group Images Azzam SLEIT (Previously, Azzam IBRAHIM) King Abdullah II School for Information Technology, University of Jordan, Amman,
More informationA Novel Watermarking Technique Based on Visual Cryptography
A Novel Watermarking Technique Based on Visual Cryptography A.Umaamaheshvari, K.Thanushkodi Abstract Digital Watermark processing technology has developed very rapidly during the recent years and widely
More informationENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY
ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY Ranjan Kumar H S 1, Prasanna Kumar H R 1, Sudeepa K B 2 and Ganesh Aithal 2 1 Dept of CSE, NMAMIT, Nitte, Karnataka, India 2
More informationVisual Secret Sharing Based Digital Image Watermarking
www.ijcsi.org 312 Visual Secret Sharing Based Digital Image Watermarking B. Surekha 1, Dr. G. N. Swamy 2 1 Associate Professor, Department of ECE, TRR College of Engineering, Hyderabad, Andhra Pradesh,
More informationProgressive Color Visual Cryptography
1 Progressive Color Visual Cryptography (Final version of the manuscript ID: JEI03158) Duo Jin, Wei-Qi Yan, Mohan S. Kankanhalli School of Computing, National University of Singapore Singapore 117543 This
More informationENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY
Cell, Manjari Road,Hadapsar,Pune-412307. India,Chief Editor:Dr.K.R.Harne,Editors:Prof R V Patil,Prof Niraja Jain ENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY AbhishekShinde,
More informationCheating Prevention in Visual Cryptography using. Steganographic Scheme
Cheating Prevention in Visual Cryptography using Steganographic Scheme Biswapati lana Department of Computer Science, Vidyasagar University, Paschim Medinipur, India. (e-mail: biswapatijana@gmail.com)
More informationMeta-data based secret image sharing application for different sized biomedical
Biomedical Research 2018; Special Issue: S394-S398 ISSN 0970-938X www.biomedres.info Meta-data based secret image sharing application for different sized biomedical images. Arunkumar S 1*, Subramaniyaswamy
More informationImproved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2
Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2 Computer science Department 1, Computer science department 2 Research scholar 1, professor 2 Mewar University, India
More informationVisual Cryptography for Biometric Privacy Arun Ross, Senior Member, IEEE, and Asem Othman, Student Member, IEEE
70 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 1, MARCH 2011 Visual Cryptography for Biometric Privacy Arun Ross, Senior Member, IEEE, and Asem Othman, Student Member, IEEE Abstract
More informationA Steganography Algorithm for Hiding Secret Message inside Image using Random Key
A Steganography Algorithm for Hiding Secret Message inside Image using Random Key Balvinder Singh Sahil Kataria Tarun Kumar Narpat Singh Shekhawat Abstract "Steganography is a Greek origin word which means
More informationHalftone based Secret Sharing Visual Cryptographic Scheme for Color Image using Bit Analysis
Pavan Kumar Gupta et al,int.j.comp.tech.appl,vol 3 (1), 17-22 Halftone based Secret Sharing Visual Cryptographic Scheme for Color using Bit Analysis Pavan Kumar Gupta Assistant Professor, YIT, Jaipur.
More informationMoiré Cryptography. Yvo Desmedt. Tri Van Le. ABSTRACT 1. INTRODUCTION
Moiré Cryptography Yvo Desmedt Department of Computer Science PO Box 4530, Florida State University Tallahassee, FL 32306, USA, and Royal Holloway College University of London, UK. desmedt@cs.fsu.edu Tri
More informationCryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme
Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Yandong Zheng 1, Hua Guo 1 1 State Key Laboratory of Software Development Environment, Beihang University Beiing
More informationCopyright protection scheme for digital images using visual cryptography and sampling methods
44 7, 077003 July 2005 Copyright protection scheme for digital images using visual cryptography and sampling methods Ching-Sheng Hsu National Central University Department of Information Management P.O.
More informationA Comprehensive Investigation of Visual Cryptography and its Role in Secure Communications
A Comprehensive Investigation of Visual Cryptography and its Role in Secure Communications Elham Shahab Dept. Computer Science Islamic Azad University dr.elhamshahab@gmail.com Hadi Abdolrahimpour Dept.
More informationA Survey Paper on Visual Cryptography for Grey Scale Images
RESEARCH ARTICLE OPEN ACCESS A Survey Paper on y for Grey Scale Images Kirti Rawat [1], Vijay Kumar Joshi [2] Department of Computer Science and Engineering IFTM University Moradabad- India ABSTRACT y
More informationData Security Using Visual Cryptography and Bit Plane Complexity Segmentation
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 8, November 2014, PP 40-44 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Data Security Using Visual Cryptography
More informationA Reversible Data Hiding Scheme Based on Prediction Difference
2017 2 nd International Conference on Computer Science and Technology (CST 2017) ISBN: 978-1-60595-461-5 A Reversible Data Hiding Scheme Based on Prediction Difference Ze-rui SUN 1,a*, Guo-en XIA 1,2,
More informationIMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING VISUAL CRYPTOGRAPHY
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING VISUAL CRYPTOGRAPHY Naoyuki Awano Department of Computer and Information Science, Seikei University, Tokyo, Japan ABSTRACT Using
More informationVisual Cryptography Scheme for Gray Scale Images based on Intensity Division
Research Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Pradeep
More informationSecret Image Sharing by Diverse Image Media
Secret Image Sharing by Diverse Image Media G.Rajathi #1, G.Sangeetha #2, D.Tamizharasi #3, S.Praveen Kumar *4 #1, #2, #3 UG Student, Dept. of CSE., Anand Institute of Higher Technology, Chennai, Tamilnadu,
More informationA New Compression Method for Encrypted Images
Technology, Volume-2, Issue-2, March-April, 2014, pp. 15-19 IASTER 2014, www.iaster.com Online: 2347-5099, Print: 2348-0009 ABSTRACT A New Compression Method for Encrypted Images S. Manimurugan, Naveen
More informationAn Implementation of LSB Steganography Using DWT Technique
An Implementation of LSB Steganography Using DWT Technique G. Raj Kumar, M. Maruthi Prasada Reddy, T. Lalith Kumar Electronics & Communication Engineering #,JNTU A University Electronics & Communication
More informationComparison of various Error Diffusion Algorithms Used in Visual Cryptography with Raster scan
Comparison of various Error Diffusion Algorithms Used in Visual Cryptography with Raster scan 1 Digvijay Singh, 2 Pratibha Sharma 1 Student M.Tech, CSE 4 th SEM., 2 Assistant Professor CSE Career Point
More informationImage Compression Supported By Encryption Using Unitary Transform
Image Compression Supported By Encryption Using Unitary Transform Arathy Nair 1, Sreejith S 2 1 (M.Tech Scholar, Department of CSE, LBS Institute of Technology for Women, Thiruvananthapuram, India) 2 (Assistant
More informationLOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD
LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE J.M. Rodrigues, W. Puech and C. Fiorio Laboratoire d Informatique Robotique et Microlectronique de Montpellier LIRMM,
More informationA Novel (2,n) Secret Image Sharing Scheme
Available online at www.sciencedirect.com Procedia Technology 4 (2012 ) 619 623 C3IT-2012 A Novel (2,n) Secret Image Sharing Scheme Tapasi Bhattacharjee a, Jyoti Prakash Singh b, Amitava Nag c a Departmet
More informationBit-level based secret sharing for image encryption
Pattern Recognition 38 (2005) 767 772 Rapid and briefcommunication Bit-level based secret sharing for image encryption Rastislav Lukac 1 Konstantinos N. Plataniotis www.elsevier.com/locate/patcog Bell
More informationIMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM
IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM Shyam Shukla 1, Aparna Dixit 2 1 Information Technology, M.Tech, MBU, (India) 2 Computer Science, B.Tech, GGSIPU, (India) ABSTRACT The main goal of steganography
More informationChapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS
44 Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 45 CHAPTER 3 Chapter 3: LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING
More informationSecure Transactio :An Credit Card Fraud Detection System Using Visual Cryptography
Secure Transactio :An Credit Card Fraud Detection System Using Visual Cryptography Prajakta Akole 1, Nikita Mane 2, Komal Shinde 3, Prof. Swati A. Khodke 4 123Student of Computer Engineering, JSPM s BSIOTR
More informationVARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES
VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES Ayman M. Abdalla, PhD Dept. of Multimedia Systems, Al-Zaytoonah University, Amman, Jordan Abstract A new algorithm is presented for hiding information
More informationImage Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator
Image Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator Geetha C.R. Senior lecturer, ECE Dept Sapthagiri College of Engineering Bangalore, Karnataka. ABSTRACT This paper
More informationReversible data hiding based on histogram modification using S-type and Hilbert curve scanning
Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 016) Reversible data hiding based on histogram modification using
More informationModified Skin Tone Image Hiding Algorithm for Steganographic Applications
Modified Skin Tone Image Hiding Algorithm for Steganographic Applications Geetha C.R., and Dr.Puttamadappa C. Abstract Steganography is the practice of concealing messages or information in other non-secret
More informationAn Integrated Image Steganography System. with Improved Image Quality
Applied Mathematical Sciences, Vol. 7, 2013, no. 71, 3545-3553 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.34236 An Integrated Image Steganography System with Improved Image Quality
More informationBidirectional Serpentine Scan Based Error Diffusion Technique for Color Image Visual Cryptography
Bidirectional Serpentine Scan Based Error Diffusion Technique for Color Image Visual Cryptography P.Mohamed Fathimal 1, Dr.P.Arockia Jansi Rani 2 Abstract Visual Cryptography is a cryptographic technique
More informationInternational Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES
Scientific Journal of Impact Factor (SJIF) : 3.134 ISSN (Print) : 2348-6406 ISSN (Online): 2348-4470 ed International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW
More informationScienceDirect. A Novel DWT based Image Securing Method using Steganography
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 46 (2015 ) 612 618 International Conference on Information and Communication Technologies (ICICT 2014) A Novel DWT based
More informationAn Enhanced Least Significant Bit Steganography Technique
An Enhanced Least Significant Bit Steganography Technique Mohit Abstract - Message transmission through internet as medium, is becoming increasingly popular. Hence issues like information security are
More informationA Novel Visual Cryptography Coding System for Jam Resistant Communication
Issues in Informing Science and Information Technology Volume 7, 2010 A Novel Visual Cryptography Coding System for Jam Resistant Communication Leemon C. Baird III, Dino Schweitzer, and William L. Bahn
More informationUnlinkability and Redundancy in Anonymous Publication Systems
Unlinkability and Redundancy in Anonymous Publication Systems Christian Boesgaard pink@diku.dk Department of Computer Science University of Copenhagen Denmark January 22, 2004 1 Introduction An anonymous
More informationImage Steganography using Sudoku Puzzle for Secured Data Transmission
Image Steganography using Sudoku Puzzle for Secured Data Transmission Sanmitra Ijeri, Shivananda Pujeri, Shrikant B, Usha B A, Asst.Prof.Departemen t of CSE R.V College Of ABSTRACT Image Steganography
More informationDirect Binary Search Based Algorithms for Image Hiding
1 Xia ZHUGE, 2 Koi NAKANO 1 School of Electron and Information Engineering, Ningbo University of Technology, No.20 Houhe Lane Haishu District, 315016, Ningbo, Zheiang, China zhugexia2@163.com *2 Department
More informationWatermarking patient data in encrypted medical images
Sādhanā Vol. 37, Part 6, December 2012, pp. 723 729. c Indian Academy of Sciences Watermarking patient data in encrypted medical images 1. Introduction A LAVANYA and V NATARAJAN Department of Instrumentation
More informationData Hiding Technique Using Pixel Masking & Message Digest Algorithm (DHTMMD)
Data Hiding Technique Using Pixel Masking & Message Digest Algorithm (DHTMMD) Abstract: In this paper a data hiding technique using pixel masking and message digest algorithm (DHTMMD) has been presented.
More informationRobust and Blind Spatial Watermarking in Digital Image
Robust and lind Spatial Watermarking in Digital Image Santi Prasad Maity Malay Kumar Kundu Dept.of Electronics Telecomm. Machine Intelligence Unit.E.College(D.U.) Indian Statical Institute Howrah -711
More informationDynamic Collage Steganography on Images
ISSN 2278 0211 (Online) Dynamic Collage Steganography on Images Aswathi P. S. Sreedhi Deleepkumar Maya Mohanan Swathy M. Abstract: Collage steganography, a type of steganographic method, introduced to
More informationJournal of Discrete Mathematical Sciences & Cryptography Vol. ( ), No., pp. 1 10
Dynamic extended DES Yi-Shiung Yeh 1, I-Te Chen 2, Ting-Yu Huang 1, Chan-Chi Wang 1, 1 Department of Computer Science and Information Engineering National Chiao-Tung University 1001 Ta-Hsueh Road, HsinChu
More informationPrinted Document Watermarking Using Phase Modulation
1 Printed Document Watermarking Using Phase Modulation Chabukswar Hrishikesh Department Of Computer Engineering, SBPCOE, Indapur, Maharastra, India, Pise Anil Audumbar Department Of Computer Engineering,
More informationEnhance Image using Dynamic Histogram and Data Hiding Technique
_ Enhance Image using Dynamic Histogram and Data Hiding Technique 1 D.Bharadwaja, 2 Y.V.N.Tulasi 1 Department of CSE, Gudlavalleru Engineering College, Email: bharadwaja599@gmail.com 2 Department of CSE,
More informationHiding Image in Image by Five Modulus Method for Image Steganography
Hiding Image in Image by Five Modulus Method for Image Steganography Firas A. Jassim Abstract This paper is to create a practical steganographic implementation to hide color image (stego) inside another
More informationHigh-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction
High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction Pauline Puteaux and William Puech; LIRMM Laboratory UMR 5506 CNRS, University of Montpellier; Montpellier, France Abstract
More informationPassport Authentication Using PNG Image with Data Repair Capability
Passport Authentication Using PNG Image with Data Repair Capability Aswathi Muralidharan, Maria Johnson, Roshna Raj, Deepika M P Abstract The system Passport Authentication Using PNG Image with Data Repair
More informationRGB Intensity Based Variable-Bits Image Steganography
RGB Intensity Based Variable-Bits Image Steganography Mohammad Tanvir Parvez and Adnan Abdul-Aziz Gutub College of Computer Sciences & Engineering King Fahd University of Petroleum & Minerals, Dhahran
More informationISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationAnalysis of Secure Text Embedding using Steganography
Analysis of Secure Text Embedding using Steganography Rupinder Kaur Department of Computer Science and Engineering BBSBEC, Fatehgarh Sahib, Punjab, India Deepak Aggarwal Department of Computer Science
More informationContrast Enhancement Based Reversible Image Data Hiding
Contrast Enhancement Based Reversible Image Data Hiding Renji Elsa Jacob 1, Prof. Anita Purushotham 2 PG Student [SP], Dept. of ECE, Sri Vellappally Natesan College, Mavelikara, India 1 Assistant Professor,
More informationExploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise
Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Kamaldeep Joshi, Rajkumar Yadav, Sachin Allwadhi Abstract Image steganography is the best aspect
More informationA Lossless Image Compression Based On Hierarchical Prediction and Context Adaptive Coding
A Lossless Image Compression Based On Hierarchical Prediction and Context Adaptive Coding Ann Christa Antony, Cinly Thomas P G Scholar, Dept of Computer Science, BMCE, Kollam, Kerala, India annchristaantony2@gmail.com,
More information